Skip to content
This repository has been archived by the owner on Dec 22, 2024. It is now read-only.

Commit

Permalink
add notes for Cyber Threat Intelligence
Browse files Browse the repository at this point in the history
  • Loading branch information
abuturabofficial committed Nov 25, 2023
1 parent c06d0fb commit 5e1b23e
Show file tree
Hide file tree
Showing 108 changed files with 1,351 additions and 5 deletions.
10 changes: 5 additions & 5 deletions _posts/2022-08-12-toc-for-cybersecurity-and-networks.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,11 +52,11 @@ IBM Cybersecurity Analyst Professional Certificate is a specialization course, w

### **6) Cyber Threat Intelligence[^7]**

1. [Threat Intelligence]
2. [Data Loss Prevention and Mobile Endpoint Protection]
3. [Scanning]
4. [SIEM Platforms]
5. [Threat Hunting]
1. [Threat Intelligence](/posts/threat-intelligence)
2. [Data Loss Prevention and Mobile Endpoint Protection](/posts/data-loss-prevention-and-mobile-endpoint-protection)
3. [Scanning](/posts/scanning)
4. [SIEM Platforms](/posts/siem-platforms)
5. [Threat Hunting](/posts/threat-hunting)

## **Cybersecurity Specialization**

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,192 @@
---
author: [abuturab, admin]
title: "Data Loss Prevention and Mobile Endpoint Protection"
date: 2023-04-27 18:25:00 +0500
tags: ['IBM Cybersecurity Analyst/Cyber Threat Intelligence']
category: ['My Notes', 'Cybersecurity and Networks']
img_path: /assets/notes
image:
path: cyber-threat-intelligence.jpeg
alt: 'Credits: Image by standret on Freepik'
published: true
---

## **What is Data Security and Protection?**

Protecting the:
- Confidentiality
- Integrity
- Availability

Of Data:
- In transit
- At rest
- Databases
- Unstructured Data (files)
- On endpoints

### What are we protecting against?

**Deliberate attack:**
- Hackers
- Denial of Service

**Inadvertent attacks:**
- Operator error
- Natural disaster
- Component failure

## **Data Security Top Challenges**

- Explosive data growth
- New privacy regulations (GDPR, Brazil’s LGPD etc.)
- Operational complexity
- Cybersecurity skills shortage

## **Data Security Common Pitfalls**

Five epic fails in Data Security:
- Failure to move beyond compliance
- Failure to recognize the need for centralized data security
- Failure to define who owns the responsibility for the data itself
- Failure to address known vulnerabilities
- Failure to prioritize and leverage data activity monitoring

## **Industry Specific Data Security Challenges**

### Healthcare

- Process and store combination of personal health information and payment card data.
- Subject to strict data privacy regulations such as HIPAA.
- May also be subject to financial standards and regulations.
- Highest cost per breach record.
- Data security critical for both business and regulatory compliance.

### Transportation

- Critical part of national infrastructure
- Combines financially sensitive information and personal identification
- Relies on distributed IT infrastructure and third party vendors

### Financial industries and insurance

- Most targeted industry: 19% of cyberattacks in 2018
- Strong financial motivation for both external and internal attacks
- Numerous industry-specific regulations require complex compliance measures

### Retail

- Among the most highly targeted groups for data breaches
- Large number of access points in retail data lifecycle
- Customers and associates access and share sensitive data in physical outlets, online, mobile applications

## **Capabilities of Data Protection**

**The Top 12 critical data protection capabilities:**
1. Data Discovery
- Where sensitive data resides
- Cross-silo, centralized efforts
2. Data Classification
- Parse discovered data sources to determine the kind of data
3. Vulnerability Assessment
- Determine areas of weakness
- Iterative process
4. Data Risk analysis
- Identify data sources with the greatest risk exposure or audit failure and help prioritize where to focus first
- Build on classification and vulnerability assessment
5. Data and file activity monitoring
- Capture and record real-time data access activity
- Centralized policies
- Resource intensive
6. Real-time Alerting
7. Blocking Masking, and Quarantining
- Obscure data and/or blocking further action by risky users when activities deviate from regular baseline or pre-defined policies
- Provide only level of access to data necessary
8. Active Analytics
- Capture insight into key threats such as, SQL injections, malicious stored procedures, DoS, Data leakage, Account takeover, data tampering, schema tampering etc
- Develop recommendations for actions to reduce risk
9. Encryption
10. Tokenization
- A special type of format-preserving encryption that substitutes sensitive data with a token, which can be mapped to the original value
11. Key Management
- Securely distribute keys across complex encryption landscape
- Centralize key management
- Enable organized, secure key management that keeps data private and compliant
12. Automated Compliance Report
- Pre-built capabilities mapped to specific regulations such as GDPR, HIPAA, PCI-DSS, CCPA and so on
- Includes:
- Audit workflows to streamline approval processes
- Out-of-the-box reports
- Pre-built classification patterns for regulated data
- Tamper-proof audit repository

![Data Loss Prevention and Mobile Endpoint Protection](Data%20Loss%20Prevention%20and%20Mobile%20Endpoint%20Protection.png){: w="650" h="350"}

## **Data Protection – Industry Example**

### Guardium support the data protection journey

![Data Loss Prevention and Mobile Endpoint Protection](Data%20Loss%20Prevention%20and%20Mobile%20Endpoint%20Protection-1.png){: w="650" h="350"}

### Guardium – Data Security and Privacy

- Protect all data against unauthorized access
- Enable organizations to comply with government regulations and industry standards

![Data Loss Prevention and Mobile Endpoint Protection](Data%20Loss%20Prevention%20and%20Mobile%20Endpoint%20Protection-2.png){: w="650" h="350"}

![Data Loss Prevention and Mobile Endpoint Protection](Data%20Loss%20Prevention%20and%20Mobile%20Endpoint%20Protection-3.png){: w="650" h="350"}

## **Mobile Endpoint Protection**

**iOS**
- Developed by Apple
- Launched in 2007
- ~13% of devices (based on usage)
- ~60% of tablets worldwide run iOS/iPadOS
- MDM capabilities available since iOS 6

**Android**
- Android Inc. was a small team working on an alternative to Symbian and Windows Mobile OS.
- Purchased by Google in 2005 – the Linux kernel became the base of the Android OS. Now developed primarily by Google and a consortium known as **Open Handset Alliance.**
- First public release in 2008
- ~86% of smartphones and ~39% of tablets run some form of Android.
- MDM capabilities since Android 2.2.

### How do mobile endpoints differ from traditional endpoints?

- Users don’t interface directly with the OS.
- A series of applications act as a broker between the user and the OS.
- OS stability can be easily monitored, and any anomalies reported that present risk.
- Antivirus software can “see” the apps that are installed on a device, and reach certain signatures, but can not peek inside at their contents.

### Primary Threats To Mobile Endpoints

**System based:**
- Jailbreaking and Rooting exploit vulnerabilities to provide root access to the system.
- Systems that were previously read-only can be altered in malicious ways.
- One primary function is to gain access to apps that are not approved or booting.
- Vulnerabilities and exploits in the core code can open devices to remote attacks that provide root access.

**App based threats:**
- Phishing scams – via SMS or email
- Malicious code
- Apps may request access to hardware features irrelevant to their functionality
- Web content in mobile browsers, especially those that prompt for app installations, can be the root cause of many attacks

**External:**
- Network based attacks
- Tethering devices to external media can be exploited for vulnerabilities
- Social engineering to unauthorized access to the device

### Protection mobile assets

- **MDM:** Control the content allowed on the devices, restrict access to potentially dangerous features.
- **App security**: Report on the health and reliability of applications, oftentimes before they even make it on the devices.
- **User Training**

### Day-to-day operations

While it may seem like a lot to monitor hundreds, thousands, or hundreds of thousands of devices daily, much of the information can be digested by automated systems and action taken without much admin interactions.

![Data Loss Prevention and Mobile Endpoint Protection](Data%20Loss%20Prevention%20and%20Mobile%20Endpoint%20Protection-4.png){: w="650" h="350"}
Loading

0 comments on commit 5e1b23e

Please sign in to comment.